Adversarial Gaussian Process Regression in Sensor Networks
暂无分享,去创建一个
[1] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[2] Yevgeniy Vorobeychik,et al. Adversarial Regression for Detecting Attacks in Cyber-Physical Systems , 2018, IJCAI.
[3] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[4] Kamal Jamshidi,et al. Anomaly detection and localization in crowded scenes using connected component analysis , 2017, Multimedia Tools and Applications.
[5] Yevgeniy Vorobeychik,et al. Resilient observation selection in adversarial settings , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[6] Carl E. Rasmussen,et al. Gaussian processes for machine learning , 2005, Adaptive computation and machine learning.
[7] Chang-Tsun Li,et al. Video Anomaly Detection With Compact Feature Sets for Online Performance , 2017, IEEE Transactions on Image Processing.
[8] Andreas Krause,et al. Near-Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies , 2008, J. Mach. Learn. Res..
[9] Abhishek Dubey,et al. Optimal detection of faulty traffic sensors used in route planning , 2017, SCOPE@CPSWeek.
[10] Mohieddine Jelali,et al. Revision of the Tennessee Eastman Process Model , 2015 .
[11] Stephen P. Boyd,et al. Sensor Selection via Convex Optimization , 2009, IEEE Transactions on Signal Processing.
[12] H. B. McMahan,et al. Robust Submodular Observation Selection , 2008 .
[13] Haris Vikalo,et al. Greedy sensor selection: Leveraging submodularity , 2010, 49th IEEE Conference on Decision and Control (CDC).
[14] E. F. Vogel,et al. A plant-wide industrial process control problem , 1993 .
[15] Khurum Nazir Junejo,et al. Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine Learning , 2016, CPSS@AsiaCCS.
[16] Paul Honeine,et al. ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.
[17] N. Lawrence Ricker,et al. Decentralized control of the Tennessee Eastman Challenge Process , 1996 .
[18] Wen-Hsien Fang,et al. Gaussian Process Regression-Based Video Anomaly Detection and Localization With Hierarchical Feature Representation , 2015, IEEE Transactions on Image Processing.